Discovering suspicious behavior in multilayer social networks

被引:47
作者
Bindu, P. V. [1 ]
Thilagam, P. Santhi [1 ]
Ahuja, Deepesh [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Mangaluru, Karnataka, India
关键词
Anomaly detection; Multi-graphs; Graph mining; Online social networks; Outlier detection; Social network analysis; ANOMALY DETECTION; MULTIPLEX;
D O I
10.1016/j.chb.2017.04.001
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Discovering suspicious and illicit behavior in social networks is a significant problem in social network analysis. The patterns of interactions of suspicious users are quite different from their peers and can be identified by using anomaly detection techniques. The existing anomaly detection techniques on social networks focus on networks with only one type of interaction among the users. However, human interactions are inherently multiplex in nature with multiple types of relationships existing among the users, leading to the formation of multilayer social networks. In this paper, we investigate the problem of anomaly detection on multilayer social networks by combining the rich information available in multiple network layers. We propose a pioneer approach namely ADOMS (Anomaly Detection On Multilayer Social networks), an unsupervised, parameter-free, and network feature-based methodology, that automatically detects anomalous users in a multilayer social network and rank them according to their anomalousness. We consider the two well-known anomalous patterns of clique/near-clique and star/near-star anomalies in social networks, and users are ranked according to the degree of similarity of their neighborhoods in different layers to stars or cliques. Experimental results on several real-world multilayer network datasets demonstrate that our approach can effectively detect anomalous nodes in multilayer social networks. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:568 / 582
页数:15
相关论文
共 75 条
  • [1] Aggarwal CC, 2011, PROC INT CONF DATA, P399, DOI 10.1109/ICDE.2011.5767885
  • [2] Ahmad MA., 2010, ICDM WORKSH, P911
  • [3] Graph based anomaly detection and description: a survey
    Akoglu, Leman
    Tong, Hanghang
    Koutra, Danai
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) : 626 - 688
  • [4] Akoglu L, 2010, LECT NOTES ARTIF INT, V6119, P410
  • [5] Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network
    Al-garadr, Mohammed Ali
    Varathan, Kasturi Dewi
    Ravana, Sri Devi
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2016, 63 : 433 - 443
  • [6] [Anonymous], 2011, P 2011 SIAM INT C DA
  • [7] [Anonymous], 2011, ROBERTS EVERTON TERR
  • [8] [Anonymous], 2010, P 16 ACM SIGKDD INT, DOI DOI 10.1145/1835804.1835907
  • [9] Barnett V., 1994, Outliers in statistical data
  • [10] Structural measures for multiplex networks
    Battiston, Federico
    Nicosia, Vincenzo
    Latora, Vito
    [J]. PHYSICAL REVIEW E, 2014, 89 (03):